- EPSS 1.97%
- Published 07.03.2006 02:02:00
- Last modified 03.04.2025 01:03:51
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting mu...
CVE-2006-0225
- EPSS 0.08%
- Published 25.01.2006 11:03:00
- Last modified 03.04.2025 01:03:51
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
- EPSS 0.7%
- Published 06.09.2005 17:03:00
- Last modified 03.04.2025 01:03:51
OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
- EPSS 2.7%
- Published 06.09.2005 17:03:00
- Last modified 03.04.2025 01:03:51
sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
CVE-2005-2666
- EPSS 0.07%
- Published 23.08.2005 04:00:00
- Last modified 03.04.2025 01:03:51
SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate ...
- EPSS 4.85%
- Published 31.12.2004 05:00:00
- Last modified 03.04.2025 01:03:51
sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the co...
CVE-2004-2760
- EPSS 0.3%
- Published 31.12.2004 05:00:00
- Last modified 03.04.2025 01:03:51
sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for...
CVE-2004-1653
- EPSS 0.38%
- Published 31.08.2004 04:00:00
- Last modified 03.04.2025 01:03:51
The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
CVE-2004-0175
- EPSS 0.31%
- Published 18.08.2004 04:00:00
- Last modified 03.04.2025 01:03:51
Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-0992.
CVE-2003-1562
- EPSS 1.27%
- Published 31.12.2003 05:00:00
- Last modified 03.04.2025 01:03:51
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use t...